CVE-2017-17741

MEDIUM

Linux Kernel < 4.14.7 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.

References (13)

Core 13
Core References
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3617-1/
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3619-2/
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2018/dsa-4082
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3617-3/
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3632-1/
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/102227
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3620-2/
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://www.spinics.net/lists/kvm/msg160796.html
Issue Tracking, Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2017/dsa-4073
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3617-2/
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3620-1/
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3619-1/

Scores

CVSS v3 6.5
EPSS 0.0006
EPSS Percentile 17.2%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Details

CWE
CWE-125
Status published
Products (2)
debian/debian_linux 9.0
linux/linux_kernel < 4.14.7
Published Dec 18, 2017
Tracked Since Feb 18, 2026